Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
arrow_back View All Dates
Wednesday, May 21
 

8:00am PDT

Best Practices for the IBM i Security Administrator
Wednesday May 21, 2025 8:00am - 9:00am PDT
Know you should be managing your IBM i Security implementation but don’t know where to start or what all needs to be checked? This session will provide you with a checklist of the areas of the operating system that should be checked on a regular basis. Carol and Steve will explain why it’s important to perform these checks along with the risks of not maintaining your security configuration. The Run SQL Script file used during the demo will be provided with the handouts.
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Steve Riedmueller

Steve Riedmueller

Certified IBM i Admin - IBM Champion, Speaker, Mentor, and Advocate, Kisco
Wednesday May 21, 2025 8:00am - 9:00am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

8:00am PDT

Compliance Enforcement and Real-time Cybersecurity for IBM i
Wednesday May 21, 2025 8:00am - 9:00am PDT
Hear about consistent practices and automation available for compliance enforcement, Endpoint Detection and Response (EDR), and broader real-time security on i and across all operating systems on Power.    See the latest features and examples of IBM PowerSC usage, with consistent user experience and single pane of glass cybersecurity management.

Learning Objectives:
1. Learn the practical meaning and usage of common cybersecurity technologies like EDR, IDP, and FIM.
2. Learn about the latest enhancements in the IBM PowerSC product for compliance and real-time security.
Speakers
avatar for Tim Hill

Tim Hill

Distinguished Engineer, Rocket Software
Tim Hill is a Distinguished Engineer and VP of Engineering at Rocket Software.  He’s responsible for security, cloud, and AI/ML products on Power and Z.  Technology areas of personal focus include model-based reasoning, deep learning, complex event correlation, network management... Read More →
Wednesday May 21, 2025 8:00am - 9:00am PDT
North Ballroom A 1150 Magic Way, Anaheim, CA 92802

9:15am PDT

IBM i Integrated MFA Solution Developer Impacts
Wednesday May 21, 2025 9:15am - 10:15am PDT
The integrated IBM i MFA solution set of features has various impacts for application developers to consider. Some impacts directly impact if or how their applications work in various configurations. Other impacts involve changes to make applications better ecosystem citizens in context of the authentication exit point information provided to those solutions. Profile handles and profile tokens is one of the primary areas of focus in the session.

Learning Objectives:
Learn about the new and updated APIs and Commands developers should be aware. Understand how updating applications to use these capabilities provides a better MFA end-user experience as well as increases the value of security solutions built on the authentication exit point support.
Speakers
avatar for Tim Mullenbach

Tim Mullenbach

IBM i Security Business Architect, IBM
Tim Mullenbach is a Senior Software Engineer at IBM Rochester.  He spent his first 20+ IBM years with the IBM i Sockets and System TLS development team prior to transitioning to the IBM i Security Business Architect role in 2018.  
Wednesday May 21, 2025 9:15am - 10:15am PDT
Safari 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

Building a Successful IFS Security Strategy
Wednesday May 21, 2025 10:45am - 11:45am PDT
Ask any security professional which area of IBM i security is most often ignored and chances are the unanimous response is a chorus of “the Integrated File System."

Many organizations are either unaware of the risks that an unsecured IFS poses or are simply unsure of how to secure it. Regardless of the reason, this is a problem. The system interface doesn’t differentiate how a user profile accesses data – which leaves sensitive data exposed and vulnerable to manipulation, malware, and even theft.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer, Fortra LLC
Sandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing. Sandi is... Read More →
Wednesday May 21, 2025 10:45am - 11:45am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

IBM i Integrated MFA Solution Deep Dive on TOTP
Wednesday May 21, 2025 10:45am - 11:45am PDT
The integrated IBM i MFA solution's primary new feature is Time-based One Time Password (TOTP) authentication implemented as a user profile attribute. We will discuss details on the implementation and expand on configuration and use.

Learning Objectives:
Learn how details on how to configure the system and users to leverage TOTP support. Learn how users can set up TOTP for their profile. See examples using Navigator as well as CL Commands to perform the administration and use of TOTP authentication.
Speakers
avatar for Tim Mullenbach

Tim Mullenbach

IBM i Security Business Architect, IBM
Tim Mullenbach is a Senior Software Engineer at IBM Rochester.  He spent his first 20+ IBM years with the IBM i Sockets and System TLS development team prior to transitioning to the IBM i Security Business Architect role in 2018.  
Wednesday May 21, 2025 10:45am - 11:45am PDT
South Ballroom A 1150 Magic Way, Anaheim, CA 92802

3:45pm PDT

Audit Journaling with Navigator for i
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
In this session, we will explore how Navigator for i makes audit journaling on the IBM i a breeze! Navigator simplifies configuring auditing to just a few button clicks. Once you are set up, Navigator makes consuming and analyzing audit journal entries simple. We will also take a look at new improvements that increase the performance of analyzing audit entries and open up the possibilities of what you can do with your auditing data.
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

5:00pm PDT

IBM i Security with an SQL Chaser - Round 3
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
In this award-winning session, be prepared to hear Scott Forstie and Carol Woodbury shake up the world of IBM i Security, mixing up yet another set of SQL concoctions to bedazzle the otherwise boring world of IBM i Security. This menu includes examples of using SQL to find vulnerabilities in your code (aka penetration testing) as well as new (but practical!) ways to use SQL services to discover and fix your security out your current processes that have reached their ‘consume by’ date. And, of course, be prepared to be a bit shaken (but not stirred).
 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -